San Francisco, CA – June 23, 2011 – OPSWAT announced their new Classification SDK for Android applications today, which adds new capabilities to the industry standard OESIS Framework. This release represents a significant step in OPSWAT’s mobile strategy by addressing the increasing challenge of software manageability associated with the rising number of mobile applications and users.
OPSWAT announced today that Palo Alto Networks has integrated the OESIS Framework into its newly released GlobalProtect™ to implement simple and consistent policy compliance checks for all network connections.Together, OPSWAT and Palo Alto Networkshave extended the unique enterprise capabilities of Palo Alto Networks’ next-generation firewalls to secure users and data regardless of location and eliminate network traffic blind spots.
Version 22.214.171.124 of the OESIS Framework for Windows, Mac and Linux is now available. With this release, V2 customers need to deploy two additional files in order to detect Antivirus, Antispyware and Firewall products (pmap.dat and vmap.dat). V3 customers only need to deploy vmap.dat. This release also includes additional support for 21 products, including support for 8 new Backup Clients.
Clearwater, FL – April 19, 2011 – The Advanced Technology Group (ATG) of GFI Software today announced that OPSWAT Inc. has added GFI VIPRE® Antivirus technology to its MetaDefender solutions portfolio.
OPSWAT is very proud to announce a release of the newest Metascan antivirus SDK. Version 2.7 adds a significant number of enhancements. These improvements increase Metascan's effectiveness, functionality and deployment capabilities. If you are looking to license a complete scanning solution, look no further than the new, improved Metascan.
Metascan now has its own knowledge base, located at https://my.opswat.com/hc/en-us/categories/200161610-Metascan
With the release of Metascan version 3.2.0, custom post actions are now available for your unique solution's needs.
Using post actions, you can now configure Metascan to run custom scripts after completing a file scan. This will allow you to adapt the actions taken for both clean and infected files. Example use cases are: